Digital Fluency MCQ's PDF
Document Details
Uploaded by Deleted User
Department of Computer Science
Tags
Summary
This document contains multiple choice questions (MCQs) related to a course on digital fluency. The course covers various topics in computer science, including Artificial Intelligence, Machine learning, and cloud computing.
Full Transcript
DIGITAL FLUENCY Digital Fluency Dept of Computer Science 1 Course Content (Digital 101) Details of topic Duration Overview of Emerging Technologies:...
DIGITAL FLUENCY Digital Fluency Dept of Computer Science 1 Course Content (Digital 101) Details of topic Duration Overview of Emerging Technologies: i. Artificial Intelligence, Machine Learning, Deep Learning, ii. Database Management for Data Science, Big Data Module 1: Emerging Analytics, Technologies iii. Internet of Things (IoT) and Industrial Internet of 05 hours Things (IIoT) iv. Cloud computing and its service models v. Cyber Security and Types of cyber attack Applications of emerging technologies: Module 2: Applications i. Artificial Intelligence of Emerging ii. Big Data Analytics Technologies iii. Internet of Things 05 hours iv. Cloud Computing v. Cyber Security Importance of the following: Module 3: Building i. Effective Communication Skills 05 hours Essential Skills Beyond ii. Creative Problem Solving & Critical Thinking Technology iii. Collaboration and Teamwork Skills iv. Innovation & Design Thinking v. Use of tools in enhancing skills Digital Fluency Dept of Computer Science 2 Module 1: Emerging Technologies 1. Artificial Intelligence, Machine Learning, Deep Learning 1. AI stands for ____________ a) Aircraft Intelligent b) Artificial Intelligence c) Aerial Intelligence d) Advanced Internet 2. What is Artificial intelligence? a) Putting your intelligence into Computer b) Programming with your own intelligence c) Making a Machine intelligent d) Playing a Game 3. Who is the father of Artificial Intelligence? a) Charles Babbage b) Alan Turing c) John McCarthy d) Bill Gates 4. In the Healthcare Industry, AI has disrupted: a) Medical Imaging b) Surgery c) Physiological Diagnosis d) None of the above 5. Which programming language is used for AI? a) Python b) LISP c) PROLOG d) All the above 6. The characteristics of the computer system capable of thinking, reasoning and learning is known is a) Machine Intelligence b) Human Intelligence c) Artificial Intelligence d) Virtual Intelligence 7. What is the full form of “ML”? a) Machine Learning b) Machine Looking c) Mechanic Link d) Many Learning Digital Fluency Dept of Computer Science 3 8. The process of training a Neural Net is: a) Model -> Train -> Training Data -> Prediction -> Test and Update b) Train -> Model - >Prediction -> Test and Update c) Training Data -> Model -> Predict -> Test and Update d) Training Data -> Predict -> Test and Update -> Model 9. A bot that can determine whether a bug is exploitable is called: a) Medecision b) Automatic Exploit Generation c) Hal d) None of the above 10. Which type of Neural Network is used by Stock Market Indices? a) LSVM b) NSTM c) LSTM d) ANSI 11. Which of the following Machine Learning Algorithms is a learning method that interacts with its environment by producing actions and and discovering errors or rewards? a) Supervised Learning b) Semi Supervised Learning c) Reinforcement Learning d) None of the above 12. The most basic type of an ANN is called: a) Feedforward Neural Network b) Recurrent Neural Network c) Boltzmann Machine Network d) None of the above 13. In a Deep Learning System, each connection between Neurons is associated with a: a) Length b) Weight c) Function d) Loop 14. The network evaluates how good its prediction was through_________. a) Cost function. b) Loss function c) Bias parameters d) Back propagation 15. What is the term used for describing the judgmental or common-sense part of problem solving? a) Heuristic b) Critical c) Value based d) Analytical Digital Fluency Dept of Computer Science 4 16. An AI technique that allows computers to understand associations and relationships between objects and events is called: a) Heuristic Processing b) Cognitive Science c) Relative Symbolism d) Pattern Matching 17. The field that investigates the mechanics of human intelligence is: a) History b) Cognitive Science c) Psychology d) Sociology 18. What is the full form of “DL”? a) Deep Learning b) Depth Learning c) Drone Launching d) Drive Loading 19. Machine learning is a subset of................ a) Deep Learning b) Artificial Intelligence c) Data Learning d) None of the above 20. Who is the father of Machine Learning? a) Geoffrey Hill b) Geoffrey Chaucer c) Geoffrey Everest Hinton d) None of the above 21.................... algorithms enable the computers to learn from data, and even improve themselves, without being explicitly programmed. a) Deep Learning b) Machine Learning c) Artificial Intelligence d) None of the above 22. Real-Time decisions, Game AI, Learning Tasks, Skill acquisition, and Robot Navigation are applications of a) Reinforcement Learning b) Supervised Learning: Classification c) Unsupervised Learning: Regression d) None of the above 23. Common classes of problems in machine learning is.............. a) Clustering b) Regression c) Classification d) All of the above Digital Fluency Dept of Computer Science 5 24. RNNs stands for? a) Receives neural networks b) Report neural networks c) Recording neural networks d) Recurrent neural networks 25. Application of machine learning methods to large databases is called a) Data Mining. b) Artificial Intelligence c) Big Data Computing d) Internet Of Things 26. Which of the following is the best machine learning method? a) Scalable b) Accuracy c) Fast d) All of the above 27. Which of the following is an example of deep learning? a) Self-driving cars b) Pattern recognition c) Natural language processing d) All of the above 28. For an image classification task, which of the following deep learning algorithm is best suited? a) Recurrent Neural Network b) Multi-Layer Perceptron c) Convolution Neural Network d) All of the above 29. Which of the following makes a neural network non-linear? a) Convolution function b) B. Batch gradient descent c) Rectified linear unit d) All of the above 30. What is true about Machine Learning? a) Machine Learning (ML) is that field of computer science b) ML is a type of artificial intelligence c) ML is a field of AI consisting of learning algorithms d) All of the Above Digital Fluency Dept of Computer Science 6 2. Database Management for Data Science, Big Data Analytics 1. Data science is the process of diverse set of data through? a) organizing data b) processing data c) analysing data d) All of the above 2. What is abbreviation of DBMS? a) Data Base Management system b) Data base mining source c) Data Base Management Schema d) Data Base Manipulation Schema 3. A centralized repository that allows you to store all your structured, unstructured and semi- structured data at any scale is called a: a) Dataset b) Database c) Data Lake d) Data Warehouse 4. Which algorithm allows you to reduce the dimension of the data while losing the least amount of information? a) Decision Trees b) K-Means Clustering c) Recurrent Neural Networks d) Principal Component Analysis 5. Which type of analytics describes or summarizes existing data to understand what is going on or what has happened? a) Descriptive Analytics b) Diagnostic Analytics c) Predictive Analytics d) Prescriptive Analytics 6. RDBMS’s store Data in the form of tables, with most commercial Relational Database Management Systems using: a) SQL b) Apache c) Workfusion d) None of the above 7. Which is an open-source relational database management system (RDBMS) with a client-server model? a) Oracle b) MySQL c) MS-Access d) None of the above Digital Fluency Dept of Computer Science 7 8. In computers, a ____ is a symbolic representation of facts or concepts from which information may be obtained with a reasonable degree of confidence. a) Data b) Knowledge c) Program d) Algorithm 9. Which of the following are Benefits of Big Data Processing? a) Cost Reduction b) Time Reductions c) Smarter Business Decisions d) All of the mentioned above 10. Data that does not conform to a data model or data schema is known as ______. a) Structured data b) Unstructured data c) Semi-structured data d) All of the mentioned above 11. Amongst which of the following is/are not Big Data Technologies? a) Apache Hadoop b) Apache Spark c) Apache Kafka d) Apache Pytarch 12. Amongst which of the following can be considered as the main source of unstructured data. a) Twitter b) Facebook c) Webpages d) All of the mentioned above 13. MongoDB is a ____ database. a) SQL b) DBMS c) NoSQL d) RDBMS 14. What are the different features of Big Data Analytics? a) Open source b) Scalability c) Data recovery d) All the above 15. According to analysts, for what can traditional IT systems provide a foundation when they're integrated with big data technologies like Hadoop? a) Big data management and data mining b) Data warehousing and business intelligence c) Management of Hadoop clusters d) Collecting and storing unstructured data Digital Fluency Dept of Computer Science 8 16. What are the 7 V's of big data? a) Volume, Velocity b) Variety, Variability c) Veracity, Visualization, and Value. d) All of the above 17. ________ has the world’s largest Hadoop cluster. a) Google b) LinkedIn c) Facebook d) IBM 18. The primary characteristics of Big Data are ________ a) Volume b) Variety c) Value d) All of the above 19. Advantages of Big Data are _______. a) Big data analysis derives innovative solutions. b) Big data analysis helps in understanding and targeting customers. c) It helps in optimizing business processes. d) All of the above Digital Fluency Dept of Computer Science 9 3. Internet of Things (IoT) and Industrial Internet of Things (IIoT) 1. IoT stands for? a) Introduction of Things b) Internet of Things c) Internet of Tracking d) Interaction of Things 2. The term "Internet of Things" was coined by? a) Kevin Ashton b) Guido van Rossum c) IBM d) Ross Ihaka 3. Which of the following category is used for business to consumer process? a) Group IoT b) Community IoT c) Industrial IoT d) Personal IoT 4. IIoT stands for __________ a) Industrial Internet of Things b) Internet Internet of Things c) Intelligence Internet of Things d) Internal Internet of Things 5. Which is the first stage in every IoT architecture? a) Sensors and actuators b) Internet getaways and Data Acquisition Systems c) Edge IT d) Data center and cloud 6. IoT devices are naturally vulnerable to ________ threats a) Sensors b) Heterogeneity c) Security d) Connectivity 7. ______ are also beneficial for the elderly, providing monitoring that can help seniors to remain at home comfortably and safely, rather than moving to a nursing home or requiring 24/7 home care a) Robotics b) Analytics c) Domotics d) None of the above Digital Fluency Dept of Computer Science 10 8. What is the full form of IaaS? a) Internet as a Software b) Internet as a Service c) Infrastructure as a Software d) Infrastructure as a Service 9. What is the full form of PaaS? a) Platform as a service b) Product as a software c) People as a service d) Press as software 10. What is the full form of SaaS? a) Software as a Service b) Source as a service c) Special as a software d) Shift as a software 11. What are the risks associated with industrial IoT? a) Ransomware infections denying access to critical systems. b) Not much awareness about internet and smart devices. c) Loss Of employment by skilled workers. d) None of the above 12. Which of the following are the biggest users of IIoT? A. Automotive Fleet Management B. Manufacturing C. Media and Entertainment a) A and B b) B and C c) A and C d) A, B and C 13. Which of the following are the top benefits of IIoT in manufacturing? A. Improvement of operational performance B. Ensuring safety and compliance C. Increasing flexibility and agility a) A and B b) A, B and C c) B and C d) A and C 14. Which of the following is the way in which an IoT device is associated with data? a) Internet b) Cloud c) Automata d) Network Digital Fluency Dept of Computer Science 11 15. An IoT network is a collection of ______ devices. a) Signal b) Machine to Machine c) Interconnected d) Network to Network 16. What is the main purpose of WoT (Web of Things) in the IoT? a) Improve the usability and interoperability b) Reduce the security c) Complex the development d) Increase the cost 17. What is the role of Big Data in IoT's Smart Grid architecture? a) Filter the data b) Locked the data c) Store data d) None of the these 18. What is the full form of IANA? a) Inter-Assessment-Number-Access b) Internet-Association-Numbers-Authority c) International-Aid-for-Network-Authority d) Internet-Assigned-Numbers-Authority 19. __________attacks are real threats to IIoT. a) Distributed Denial-of-Service (DDoS) b) Worms c) Ransomware d) Virus 20. Which of the following is true? a) IIoT is not eqivalent to IoT b) IIoT is independent of IoT c) IIoT is dependent on some features of IoT d) None of these Digital Fluency Dept of Computer Science 12 4. Cloud computing and its service models 1. What is Cloud Computing? a) Cloud Computing means providing services like storage, servers, database, networking, etc b) Cloud Computing means storing data in a database c) Cloud Computing is a tool used to create an application d) None of the mentioned 2. Who is the father of cloud computing? a) Sharon B. Codd b) Edgar Frank Codd c) J.C.R. Licklider d) Charles Bachman 3. Which of the following are the features of cloud computing? a) Security b) Availability c) Large Network Access d) All of the mentioned 4. Which of the following is a type of cloud computing service? a) Service-as-a-Software b) Software-and-a-Server c) Software-as-a-Service d) Software-as-a-Storage 5. Which one of these are not one of the big names in the FinTech cloud computing sector? a) Amazon Web Services b) Microsoft Silverlight c) Google Virtual Cloud d) Microsoft Azure 6. The resilience of Cloud deployments: a) Increases Uptime b) Simplifies Disaster Recovery c) Both a and b d) None of the above 7. An example of PaaS is: a) Rackspace Cloud b) Mosso c) Amazon EC2 d) Gmail 8. Which cloud service model is the most widely used in the world? a) SaaS b) PaaS c) IaaS d) All of them Digital Fluency Dept of Computer Science 13 9. Amazon Elastic MapReduce offers a _______ framework to process large amounts of data. a) R b) Hadoop c) Python d) None of the above. 10. ________is also known as hosted software or on-demand software a) SaaS b) PaaS c) IaaS d) None 11. The __________ service delivery model allows a customer to rent virtualized servers and associated services used to run existing applications, or to design, develop, test, deploy and host applications. a) SaaS b) PaaS c) IaaS d) None 12. What does the word Cloud represent in cloud computing? a) Internet b) Wireless c) Data d) Disk 13. Public cloud is also called as _______. a) Paas – platform as a service b) Iaas - infrastructure as a service c) Saas – software as a service d) Haas - hardware as a service 14. Which technique is used in creating cloud computing? a) Transubstantiation b) Virtualization c) Insubordination d) Cannibalization 15. A private cloud is ________. a) It is a cloud maintained within an enterprise data center. b) It can be accessible by anyone c) It is offered offline d) All the above 16. Amazon uses ________as a cloud platform. a) AWS b) Azure c) Opera d) Gdrive Digital Fluency Dept of Computer Science 14 5. Cyber Security and Types of cyber attack 1. What is Cyber Security? a) Cyber Security provides security against malware b) Cyber Security provides security against cyber-terrorists c) Cyber Security protects a system from cyber attacks d) All of the mentioned 2. Who is the father of computer security? a) August Kerckhoffs b) Bob Thomas c) Robert d) Charles 3. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information? a) Cyber attack b) Computer security c) Cryptography d) Digital hacking 4. Which of the following is a type of cyber security? a) Cloud Security b) Network Security c) Application Security d) All of the above 5. What are the features of cyber security? a) Compliance b) Defense against internal threats c) Threat Prevention d) All of the above 6. Which of the following is a component of cyber security? a) Internet Of Things b) AI c) Database d) Attacks 7. ____________ uses software and hardware methods to tackle external threats that can arise in the development stage of an application a) Disaster Recovery b) Application Security c) Information Security d) Endpoint Security Digital Fluency Dept of Computer Science 15 8. Critical Infrastructure does not include a) Electricity Grid b) Water Purification c) Traffic Lights d) Cooking Gas Lines 9. The full form of SEG is: a) Secure Email Gateway b) Secure Ecommerce Gateway c) Security Email Gateway d) Secure Email Gate 10. Which attack involves using IP spoofing and the ICMP to saturate a target network with traffic? a) Smurf attack b) Teardrop attack c) Replay attack d) None of the above 11. Which of the following is a type of cyber-attack? a) Phishing b) SQL Injections c) Password Attack d) All of the above 12. Which of the following is defined as an attempt to harm, damage or cause threat to a system or network? a) Digital crime b) Threats c) System hijacking d) Cyber Attack 13. What is the existence of weakness in a system or network is known as? a) Attack b) Exploit c) Vulnerability d) Threat 14. Which of the following is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information? a) MiTM attack b) Phishing attack c) Website attack d) DoS attack 15. Which of the following DDoS in mobile systems wait for the owner to trigger the cyber-attack? a) Botnets b) Programs c) Virus d) Worms Digital Fluency Dept of Computer Science 16 16. Which of the following can diminish the chance of data leakage? a) Steganography b) Chorography c) Cryptography d) Authentication 17. The full form of Malware is ________ a) Malfunctioned Software b) Multipurpose Software c) Malicious Software d) Malfunctioning of Security 18. _____________ is a code injecting method used for attacking the database of a system / website. a) HTML injection b) SQL Injection c) Malicious code injection d) XML Injection 19. When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place. a) Database crash attack b) DoS (Denial of Service) attack c) Data overflow Attack d) Buffer Overflow attack 20. These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium. a) Malware b) Remote Access Trojans c) Keyloggers d) Spyware 21. Which of the following is considered as the unsolicited commercial email? a) Virus b) Malware c) Spam d) All of the above 22. _______ is a type of software designed to help the user's computer detect viruses and avoid them. a) Malware b) Adware c) Antivirus d) Both B and C 23. Which one of the following usually used in the process of Wi-Fi-hacking? a) Aircrack-ng b) Wireshark c) Norton d) All of the above Digital Fluency Dept of Computer Science 17 24. To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system. a) Antivirus b) Firewall c) VLC player d) Script 25. Hackers usually used the computer virus for ______ purpose. a) To log, monitor each and every user's stroke b) To gain access the sensitive information like user's Id and Passwords c) To corrupt the user's data stored in the computer system d) All of the above 26. Which type of the following malware does not replicate or clone them self's through infection? a) Rootkits b) Trojans c) Worms d) Viruses 27. Which of the following known as the oldest phone hacking techniques used by hackers to make free calls? a) Phreaking b) Phishing c) Cracking d) Spraining 28. ____________ is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks. a) Cloud b) Pen drive c) Website d) Email 29. Unsolicited Bulk E-mails (UBI) are called __________ a) SMS b) MMS c) Spam emails d) Malicious emails 30. Which one of the following is/are a type of antivirus program? a) Quick heal b) Mcafee c) Kaspersky d) All of the above Digital Fluency Dept of Computer Science 18 Module 2: Applications of Emerging Technologies Digital Fluency Dept of Computer Science 19 Applications of Artificial Intelligence 1. Self-driving cars usually use Limited Memory technology to: a) Store data b) Automate c) Detect Motion d) None of the above 2. Which of these is NOT an application of AI? a) Language Translation b) Voice Recognition c) Robotics d) Obtain massive training data sets 3. Which of the following are examples of Weak AI? a) Siri & Alexa b) Advanced Chess Programs c) Siri, Alexa & Advanced Chess Programs d) None of the above 4. Predictive maintenance, an application of AI, prevents unplanned downtime. a) True b) False 5. What are the main goals of AI? a) To Create Expert Systems b) To Implement Human Intelligence in Machines c) Both A and B d) None of the Above 6. Which of the following is not the type of AI? a) Reactive machines b) Unlimited memory c) Theory of mind d) Self-awareness 7. Which of the following is an application of AI? a) Gaming b) Expert Systems c) Vision Systems d) All of the above 8. Which of the following is not a stage of AI? a) Predictive analytics b) Diagnostic analytics c) Cognitive analytics d) All of the above Digital Fluency Dept of Computer Science 20 Applications of Big Data Analytics 1. Which type of analytics ensures that the path is predicted for the future course of action? a) Predictive Analytics b) Prescriptive Analytics c) Diagnostic Analytics d) None of the above 2. Customer Segmentation and Differential Pricing Strategy can be easily achieved through_______ a) Big Data Analytics b) Web pages c) Browsers d) Hardware’s 3. Which data analysis fails to cope with the advent of Big Data which is essentially huge data, both structured and unstructured? a) Traditional b) New c) Low d) None of the above 4. Healthcare big data refers to ___________________ consumer, patient, physical, and clinical data that is too vast or complex to be understood by traditional means of data processing. a) Collecting b) Analyzing c) Leveraging d) All of the above 5. Which of the following are example(s) of Real Time Big Data Processing? a) Complex Event Processing (CEP) platforms b) Stock market data analysis c) Bank fraud transactions detection d) both (a) and (c) 6. Data analysis is the process of: a) Examining data to find facts b) Relationships, c) Patterns, insights and/or trends. d) All the above Digital Fluency Dept of Computer Science 21 Applications of Internet of Things 1. Which service permits the changes to the IoT services? a) Update b) Registered service status c) Enable from suspension d) Enable 2. What is the component of an IoT system that executes a program? a) Sensor b) Microcontroller c) Actuator d) Digital to analog converter 3. You're hosting a party in your home and your guests have arrived. The smart security camera will a) Detect the number of people who have entered the home, report to the AI Control Center and automatically turn on the lights b) Wait to receive the instructions from the owner of the house to turn on the lights c) Both a and b d) None of the above 4. The latest advances of Technology have tremendous potential to: a) Impact the jobs of the people b) Benefit people by Increasing efficiency and reducing waste c) Both a and b d) None of the above 5. ___________ is a network of Internet-linked devices, vehicles, and appliances that can collect and share data without the need of human interaction a) Internet of things b) Web browsers c) Search engines d) Google 6. IoT gateway must provide __________ a) Protocol abstraction b) Data storage c) Security with hardware d) Simple and fast installation Digital Fluency Dept of Computer Science 22 Applications of Cloud Computing 1.............. is the essential concept related to Cloud? a) Reliability b) Abstraction c) Productivity d) None of the above 2. The Private cloud is a – a) A cloud service inaccessible to anyone but the cultural elite b) Standard cloud service offered via the Internet c) Cloud architecture maintained within an enterprise data centre. d) All of the above 3. Which one of the following is a model for cloud computing? a) County b) Public c) Ethernet d) Topology 4. Cloud Computing can store a tremendous amount of data which can also help: a) Big Data Analytics b) Action Items c) Cloud Networks d) None of the above 5. Cloud Computing architect also depends on: a) Information, Technology, and Application b) Information, Bandwidth, and Application c) Type, Security, and Application d) None of the above 6. _________is believed to facilitate greater collaboration and enhance the learning opportunities. a) Cloud Computing b) IoT c) Hacking d) Big data Digital Fluency Dept of Computer Science 23 Applications of Cybersecurity 1. Which of the following option is used to protect data and passwords? a) Authorization b) Authentication c) Encryption d) Non-repudiation 2. Which of the following is the first computer virus? a) Creeper b) Sasser c) Blaster d) All of the above 3. Firewalls are used to protect______ a) Fire attacks b) Virus attacks c) Unauthorised access d) Data driven attacks 4. The easiest way for attackers to gain network access is to: a) Leverage existing vulnerabilities b) Creating new vulnerabilities c) Send Spam mails d) None of the above 5. Which of the following is the recommended security standard for electronic payment processing? a) COBIT b) HIPAA rules c) PCI DSS d) None Digital Fluency Dept of Computer Science 24 Module 3: Building Essential Skills Beyond Technology Digital Fluency Dept of Computer Science 25 1. Effective Communication Skills 1. The origin of the word communication is ____________ a) Communicate b) Communicare c) Compute d) Computer 2. The word 'Communication' has been derived from _______ a) Greek b) Latin c) German d) French 3. Communication is a non-stop______________. a) Paper b) process c) programme d) plan 4. The _______________ is the person who transmits the message. a) Receiver b) Driver c) Sender d) Cleaner 5. What can prevent Communication from taking place at all? a) Absence of Channel b) Absence of Team c) Absence of Feelings d) None of the above 6. Which of the following increase at workplace through effective Communication? A. Loyalty. B. Efficiency. a) only A b) only B c) both A and B d) None of the above 7. Which non-verbal aspect makes the most impact in verbal face-to-face communication? a) Eye Contact b) Professional Attire c) Communication Venue d) None of the above Digital Fluency Dept of Computer Science 26 8. Which of the following can be considered as part of digital Communication? a) E-mails b) WhatsApp messages. c) Facebook messenger d) All of the above 9. Which of the following is the benefit of effective communication in an organisation? a) Improved Technical Competence b) Increased Productivity c) Better Adherence to Office Timings d) None of the above 10. The response to a sender's message is called____ a) Food bank b) Feedback c) Look back d) Backward 11. ___________context refers to the relationship between the sender and the receiver. a) Social b) Physical c) Cultural d) Chronological 12. Cultural context refers to the similarity of backgrounds between the sender and the receiver. a) Physical b) Social c) Chronological d) Cultural 13. _________refers to all these factors that disrupt the communication. a) Nonsense b) Noise c) Nowhere d) Nobody 14. Our dress code is an example of ____________ communication. a) Verbal b) Nonverbal c) Written d) Spoken 15. _________communication includes tone of voice body language, facial expressions etc. a) Nonverbal b) verbal c) letter d) notice Digital Fluency Dept of Computer Science 27 16. Letter, e-mail telephone are examples of ____________ a) Message b) Feedback c) Channel d) Encoding 17. _______ are needed to communicate effectively with people. a) Self-Management Skills b) Communication Skills c) ICT Skills d) Time Management Skills 18. ________________ is/are elements of a communication cycle. a) Sender b) Receiver c) Channel d) All of the above 19. Which of the following is the method of communication? a) Face to Face b) E-mail c) Notices/Posters d) All of the above 20. ____ includes sounds, words, language, and speech. a) Verbal communication b) Non-Verbal communication c) Both of the above d) None of the above 21. What are the types of words we should use for verbal communication? a) Acronyms b) Simple c) Technical d) Jargons 22. Non-Verbal Communication includes ______ a) Gestures b) Expressions c) Body Language d) All of the above 23. Feedback given by the receiver is ______ a) always positive b) always negative c) positive or negative d) None of the above Digital Fluency Dept of Computer Science 28 24. Which of the following is not the 7Cs principle of communication? a) Concrete b) Coherent c) Complete d) Compare 25. Which of the following 7Cs Principle is represented by the words “Use exact words and facts” a) Clear b) Concise c) Concrete d) Correct 26. Which of the following 7Cs Principle is represented by the words “Include all the needed information”? a) Clear b) Complete c) Concrete d) Correct 27. ___________is not required for effective communication. a) Appropriate gesture b) Speech modulation c) Charming personality d) Good knowledge of the content 28. Oral communication ensures________ and ___________. a) Fluency; speed b) adequate attention; immediate response c) speedy interaction; immediate response d) speed; attention 29. Which of the following is not the 3P’s of Public Speaking? a) Prepare b) Promotion c) Practice d) Perform 30. Choose the correct example of oral communication. a) Reports b) Newspapers c) Face-to-face conversation d) Notes 31. Examples of language barriers include using jargon, abbreviations and: a) Unfamiliar expressions b) Fixed expressions c) Regular expression d) None of the above Digital Fluency Dept of Computer Science 29 32. Which of the following can be called a 'perceptual' barrier to communication? a) Negative Feelings b) Cultural Norms c) Pre-made Assumptions d) None of the above 33. __________ are problems arising from expression. a) Cultural barriers b) Semantic problems c) Wrong assumptions d) Selecting perception 34. ______ is the first enemy of communication. a) Noise b) Clarity c) Politeness d) Completeness 35. Which of these is NOT a common communication barrier? a) Linguistic barrier b) Interpersonal barrier c) Financial barrier d) Organizational barrier Digital Fluency Dept of Computer Science 30 2. Creative Problem Solving & Critical Thinking 1. What is the first step to solving a problem? a) Generating alternatives b) Defining the Problem c) Selecting alternatives d) Making a decision 2. What is usually the most important question you can ask in any given situation? a) How much money can I make? b) Who is responsible? c) Why? d) Can I accomplish this? 3. When a problem arises, you should... a) Solve it as soon as possible. b) Take time to observe the situation and discover the cause of the issue. c) Walk away; it is most likely not your responsibility. d) Ask your friends what they would do. 4. Which of the following skillsets is most important when entering the workforce? a) Communication skills. b) Managerial skills. c) Interpersonal skills. d) All are equally important. 5. Which three actions should you take to analyze information? a) Compare, contrast and connect. b) Prioritize, pursue and persuade. c) Question, quiz and quarrel. d) Navigate, nurture and negotiate. 6. What should you do when you make a mistake? a) Blame the others involved. b) Don't think about it ever again. c) Examine what you learned from it. d) Lecture others about it. 7. Critical thinking is all about _____________ while creative thinking is more about _____________. a) Analysing problems and evaluating outcomes...discovering different perspectives and brainstorming ideas. b) Finding objective answers...coming up with subjective answers. c) Brainstorming...analysis. d) Shallow thinking...deeper-level thinking. Digital Fluency Dept of Computer Science 31 8. What is the importance of critical thinking? a) Critical thinking can help you focus on issues and gather relevant, accurate information. b) Critical thinking can help you analyze questions and problems. c) Critical thinking can help you organize your thoughts logically. d) All of the above 9. What is the importance of problem solving? a) It helps to identify and narrow the problem. b) It helps to develop the alternatives. c) It helps to evaluate the alternatives. d) All of the above 10. Strategies for creative thinking include: a) Never be afraid to ask any question, even those you think may be silly. b) Take risks and dream big. c) Force yourself to do something old in a new way. d) All of the above 11. Creative Problem-Solving Process can be applied where you have: a) Motivation, imagination, responsibility b) Responsibility, ownership, imagination c) Ownership, motivation, imagination d) None of the above 12. Those who think critically tend to be: a) Instinctual problem-solvers b) Efficient leaders c) Ace speakers d) None of the above 13. Which of the following best describes a 'Creative challenge'? a) Encourages team work b) Encourages ideation c) Stimulates self-awareness d) None of the above 14. Identify the important factors that one should consider while trying to approach a problem. a) Functionality and improvement b) Need and improvement c) Cause and effect d) None of the above 15. Which technique allows you to collect a number of ideas that can be a potential solution to a problem and can be used in either a group or individual setting? a) Brainstorming b) Mind Mapping c) Synectics d) None of the above Digital Fluency Dept of Computer Science 32 16. Which of the following can actually hinder your critical thinking goal. a) Intuitive judgment b) Social environment c) Rational thinking d) None of the above 17. The Functional Fixedness barrier is as a result of: a) Unwarranted boundaries b) Not thinking creatively c) Emotional weakness d) None of the above 18. A major obstacle to creative thinking is called "homeostasis". It means______________ a) Fear Of Failure b) Striving For Constancy c) Fear of criticism d) Lack of direction 19. What is the worst thing for a critical thinker? a) A logical mind b) An emotional mind c) Reaching to conclusion too soon. d) None of the above Digital Fluency Dept of Computer Science 33 3. Collaboration and Teamwork Skills 1. What is a Team? a) A group of people working on different things. b) A group of people where one member does all the work. c) A group of people where one member makes all the decisions. d) A team is a small group of people working together for a common purpose. 2. With "teamwork", members create a strong sense of mutual ____________________. a) honesty. b) hygiene. c) commitment. d) friendship. 3. _____________________ skills such as writing, speaking and body language are important work ethics so that you can be clear in your messages to others a) Communication b) Catching c) Performance d) Mental 4. ______________________ is important at work because you must be able to work with others, especially if you don’t always agree with them a) Honesty b) Teamwork c) Appearance d) Caring 5. It is important to have a good ____________ to be successful in your career. a) attitude b) clothes c) attendance d) shoes 6. Benefits of teamwork include... a) Increased productivity, motivation, and morale b) Improved product quality and customer service c) Both a and b d) None of the above 7. Act of working effectively with others to achieve a common goal a) Teamwork b) Collaboration c) Skills d) Personality Types Digital Fluency Dept of Computer Science 34 8. what personality trait do people in the health care need? a) change your mistakes b) patience c) always late d) selfish 9. Which of the following is/are benefit(s) of Collaboration? a) Increased Efficiency and Productivity. b) Learning and Partnerships. c) Both a and b d) None of the above 10. Lack of direction given to the team members in a remote team can lead to: a) Inefficient results b) Innovative results c) Effective results d) None of the above 11. Which of the following is a one of the most important aspects in any organization? a) Improving Internal employee communication b) Creating Silos c) Digital Transformation d) None of the above 12. What is a key step in Teamwork? a) Leadership b) Responsibility c) Organization d) All of the above 13. What does Teamwork mean? a) To work well with others b) To work hard c) To communicate well d) To work using soft skills 14. What is a virtual team? a) A team with one leader b) A team that is created in one place c) A team that communicates with technology d) A team with no structure 15. Who is the leader? a) A member with bad behaviour b) The one making decisions c) The one teaching the subject in the team d) The main source of the team 16. What are the benefits of working together? a) We see our own faults and criticize them b) Allows each individual to grow and succeed c) Fails to see personal weaknesses d) Learns to work independently Digital Fluency Dept of Computer Science 35 4. Innovation & Design Thinking 1. ______________ shows the process of creating something new. a) Innovation b) Business model c) Modeling d) Creative flexibility 2. Process innovation refers to: a) the development of a new service. b) the development of a new product. c) the implementation of a new or improved production method. d) the development of new products or services. 3. ______ is a toolkit for an entrepreneur to solve complex problems for people. a) One-on-one interviewing b) Design thinking c) Product brainstorming d) Social media 4. What are the steps of Design Thinking Process? a) Understand > Draw > Ideate > Create > Test b) Empathise > Define > Ideate > Prototype > Test c) Empathise > Design > Implement > Produce > Test d) Understand > Define > Ideate > Produce > Try 5. Design Thinking typically helps in _______ a) Innovation b) Data analytics c) Financial planning d) Operational efficiency 6. Design Thinking is: a) Thinking about design b) Designing ways in which people think c) Asking users to solve problems d) Defining, framing and solving problems from users' perspectives 7. What is the first step in the Design Thinking Process? a) Empathize b) Define c) Ideate d) Prototype Digital Fluency Dept of Computer Science 36 8. Understanding of human needs happens at the stage of: a) Testing b) Prototyping c) Empathizing d) None of the above 9. Feedback and test phase, in the Design Thinking process, is required because: a) It makes the process more impactful b) It allows one to eliminate the fine gap that exists between expectation and reality c) It helps with the iteration process d) None of the above 10. Which of the following are essential to the process of Innovation? a) Learning, planning, and reasoning b) Learning, reflecting, and prototyping c) Learning, resolving, and validating d) None of the above 11. Which of the following is an important trait for becoming an innovative person? a) Constant credibility b) Constant curiosity c) Constant attention d) None of the above Digital Fluency Dept of Computer Science 37